Given that firewalls are meant to compare corporate access policies with connection information, Cyberoam offers the only firewall that adds user identity to the firewall rule matching criteria in addition to source, destination zone and IP address and service rather than rely on blanket corporate policies. In doing so, it controls access based on the individual user’s work profile. It offers control over P2P, IM traffic with high granularity, allowing access to the application where necessary, but disallows file sharing. In addition, Cyberoam offers schedule-based access control to enterprises.

In case of multiple gateways, enterprises can create Cyberoam firewall rules to route user and application traffic over a pre-defined gateway. With user identity as the central point, Cyberoam’s hardware firewall appliance allows policies to be created for all the UTM features on a single firewall page, delivering higher levels of security.

Enterprise-Grade Security

Cyberoam offers high availability with stateful failover to minimize single point of failure and ensure business continuity.